Results 11 to 20 of about 302 (149)

Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence [PDF]

open access: yesScientific Reports
The Internet of Medical Things (IoMT) transforms healthcare by enabling real-time monitoring of patient vitals, such as heart rate and glucose levels, but faces significant challenges in securing sensitive data against cyber threats and ensuring ...
Soufiane Ben Othman, Gyanendra Kumar
doaj   +2 more sources

A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update [PDF]

open access: yesSensors
Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable ...
Jian Jiang   +3 more
doaj   +2 more sources

Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]

open access: yesLaryngoscope
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ   +15 more
europepmc   +2 more sources

Nonlinear optical properties of photosensory core modules of monomeric and dimeric bacterial phytochromes. [PDF]

open access: yesProtein Sci
Abstract Near‐infrared (NIR) fluorescent proteins and optogenetic tools derived from bacterial phytochromes' photosensory core modules (PCMs) operate within the first (NIR‐I) tissue transparency window under single‐photon activation. Leveraging two‐photon (2P) light in the second transparency window (NIR‐II) for photoswitching bacterial phytochromes ...
Galiakhmetova D   +11 more
europepmc   +2 more sources

Masking ring-LWE [PDF]

open access: yesJournal of Cryptographic Engineering, 2016
In this paper, we propose a masking scheme to protect ring-LWE decryption from first-order side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is computed by first performing polynomial arithmetic on the secret key and then decoding the result. We mask the polynomial operations by arithmetically splitting the secret key
De Clercq, Ruan   +4 more
openaire   +2 more sources

Reduction From Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS

open access: yesIEEE Access, 2020
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the short integer solution (SIS) problem and the learning with error (LWE).
Zahyun Koo, Jong-Seon No, Young-Sik Kim
doaj   +1 more source

Towards an efficient LWE‐based fully homomorphic encryption scheme

open access: yesIET Information Security, 2022
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah   +1 more
doaj   +1 more source

A Masked Ring-LWE Implementation [PDF]

open access: yes, 2015
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain.
Reparaz, Oscar   +3 more
openaire   +2 more sources

Implementing Conjunction Obfuscation Under Entropic Ring LWE [PDF]

open access: yes2018 IEEE Symposium on Security and Privacy (SP), 2018
We address the practicality challenges of secure program obfuscation by implementing, optimizing, and experimentally assessing an approach to securely obfuscate conjunction programs proposed in [1]. Conjunction programs evaluate functions f (x_1,...,x_L) = wedge_i in _I y_i, where y_i is either x_i or -x_i and I subseteq [L], and can be used as ...
Cousins, David Bruce   +7 more
openaire   +1 more source

A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme

open access: yesJournal of Mathematical Cryptology, 2022
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj   +1 more source

Home - About - Disclaimer - Privacy